exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA-99-14.bind

CA-99-14.bind
Posted Nov 11, 1999

Six vulnerabilities have been found in BIND, the popular domain name server from the Internet Software Consortium (ISC). One of these vulnerabilities may allow remote intruders to gain privileged access to name servers. www.cert.org

tags | remote, vulnerability
SHA-256 | ee523a2d61af834aebd1cc325b42419e5c01a7e5fbeabb2f5fdb3ba53fa3ffdf

CA-99-14.bind

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND

Original release date: November 10, 1999
Last revised: --
Source: CERT/CC

A complete revision history is at the end of this file.

Systems Affected

* Systems running various versions of BIND

I. Description

Six vulnerabilities have been found in BIND, the popular domain name
server from the Internet Software Consortium (ISC). One of these
vulnerabilities may allow remote intruders to gain privileged access
to name servers.

Vulnerability #1: the "nxt bug"

Some versions of BIND fail to properly validate NXT records. This
improper validation could allow an intruder to overflow a buffer and
execute arbitrary code with the privileges of the name server.

NXT record support was introduced in BIND version 8.2. Prior versions
of BIND, including 4.x, are not vulnerable to this problem. The
ISC-supplied version of BIND corrected this problem in version 8.2.2.

Vulnerability #2: the "sig bug"

This vulnerability involves a failure to properly validate SIG
records, allowing a remote intruder to crash named; see the impact
section for additional details.

SIG record support is found in multiple versions of BIND, including
4.9.5 through 8.x.

Vulnerability #3: the "so_linger bug"

By intentionally violating the expected protocols for closing a TCP
session, remote intruders can cause named to pause for periods up to
120 seconds.

Vulnerability #4: the "fdmax bug"

Remote intruders can consume more file descriptors than BIND can
properly manage, causing named to crash.

Vulnerability #5: the "maxdname bug"

Improper handling of certain data copied from the network could allow
a remote intruder to disrupt the normal operation of your name server,
possibly including a crash.

Vulnerability #6: the "naptr bug"

Some versions of BIND fail to validate zone information loaded from
disk files. In environments with unusual combinations of permissions
and protections, this could allow an intruder to crash named.

Other recent BIND-related vulnerabilities

AusCERT recently published a report describing denial-of-service
attacks against name servers. These attacks are unrelated to the
issues described in this advisory. For information on the
denial-of-service attacks described by AusCERT, please see AusCERT
Alert AL-1999.004 available at:

ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos

II. Impact

Vulnerability #1

By exploiting this vulnerability, remote intruders can execute
arbitrary code with the privileges of the user running named,
typically root.

Vulnerabilities #2, #4, and #5

By exploiting these vulnerabilities, remote intruders can disrupt the
normal operation of your name server, possibly causing a crash.

Vulnerability #3

By periodically exercising this vulnerability, remote intruders can
disrupt the ability of your name server to respond to legitimate
queries. By intermittently exercising this vulnerability, intruders
can seriously degrade the performance of your name server.

Vulnerability #6

Local intruders who gain write access to your zone files can cause
named to crash.

III. Solution

Apply a patch from your vendor or update to a later version of BIND

Many operating system vendors distribute BIND with their operating
system. Depending on your support procedures, arrangements, and
contracts, you may wish to obtain BIND from your operating system
vendor rather than directly from ISC.

Appendix A contains information provided by vendors for this advisory.
We will update the appendix as we receive more information. If you do
not see your vendor's name, the CERT/CC did not hear from that vendor.
Please contact your vendor directly.

Appendix A. Vendor Information

Vendor Name

Caldera

See ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current
MD5s
db1dda05dbe0f67c2bd2e5049096b42c RPMS/bind-8.2.2p3-1.i386.rpm
82bbe025ac091831904c71c885071db1 RPMS/bind-doc-8.2.2p3-1.i386.rpm
2f9a30444046af551eafd8e6238a50c6 RPMS/bind-utils-8.2.2p3-1.i386.rpm
0e4f041549bdd798cb505c82a8911198 SRPMS/bind-8.2.2p3-1.src.rpm

Compaq Computer Corporation

At the time of writing this document, Compaq is currently
investigating the potential impact to Compaq's BIND release(s).

As further information becomes available Compaq will provide notice of
the completion/availability of any necessary patches through AES
services (DIA, DSNlink FLASH and posted to the Services WEB page) and
be available from your normal Compaq Services Support channel.

Data General

We are investigating. We will provide an update when our investigation
is complete.

Hewlett-Packard Company

HP is vulnerable, see the chart in the ISC advisory for details on
your installed version of BIND. Our fix strategy is under
investigation, watch for updates to this CERT advisory in the CERT
archives, or an HP security advisory/bulletin.

IBM Corporation

The bind8 shipped with AIX 4.3.x is vulnerable. We are currently
working on the following APARs which will be available soon:

APAR 4.3.x: IY05851

To Order

APARs may be ordered using Electronic Fix Distribution (via FixDist)
or from the IBM Support Center. For more information on FixDist,
reference URL:

http://aix.software.ibm.com/aix.us/swfixes/

or send e-mail to aixserv@austin.ibm.com with a subject of "FixDist".

IBM and AIX are registered trademarks of International Business
Machines Corporation.

The Internet Software Consortium

ISC has published an advisory regarding these problems, available at

http://www.isc.org/products/BIND/bind-security-19991108.html

The ISC advisory also includes a table summarizing which versions of
BIND are susceptible to the vulnerabilities described in this
advisory.

OpenBSD

As far as we know, we don't ship with any of those vulnerabilities.

Santa Cruz Operation, Inc

Security patches for the following SCO products will be made available
at http://www.sco.com/security

OpenServer 5.x.x, UnixWare 7.x.x, UnixWare 2.x.x

Sun Microsystems

Vulnerability #1

Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, and 7 are not vulnerable.

Vulnerability #2

Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, and 7 are not vulnerable.

Vulnerability #3

Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
Sun will be producing patches for Solaris 7.

Vulnerability #4

Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
Solaris 7 is probably not vulnerable. We are still
investigating.

Vulnerability #5

Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
Sun will be producing patches for Solaris 7.

Vulnerability #6

Solaris 2.3, 2.4, 2.5, 2.5.1, and 2.6 are not vulnerable.
Sun will be producing patches for Solaris 7.
_________________________________________________________________

The CERT Coordination Center would like to thank David Conrad, Paul
Vixie and Bob Halley of the Internet Software Consortium for notifying
us of these problems and for their help in constructing the advisory,
and Olaf Kirch of Caldera for notifying us of some of these problems
and providing technical assistance and advice.
______________________________________________________________________

This document is available from:
http://www.cert.org/advisories/CA-99-14-bind.html
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
Monday through Friday; they are on call for emergencies during other
hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from

http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from
our web site

http://www.cert.org/

To be added to our mailing list for advisories and bulletins, send
email to cert-advisory-request@cert.org and include SUBSCRIBE
your-email-address in the subject of your message.

Copyright 1999 Carnegie Mellon University.
Conditions for use, disclaimers, and sponsorship information can be
found in

http://www.cert.org/legal_stuff.html

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________

Revision History
November 10, 1999: Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBOCo3W1r9kb5qlZHQEQIY9QCgjh17l5yAtNrLFSSj2EJ3HYUe8hgAoOol
1lRvWBJAlYs63OEqqJ+mCfr2
=bBA/
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close